Member-only story
Extract all Bug Bounty programs
Monitor and fetch new bug bounty targets from all platforms easily 24x7
Bounty targets from Bugcrowd, HackerOne, Federacy, Intigriti & Yeswehack
⚙️ Source by Arkadiy Tetelman
📥Download all the domains currently available
wget https://raw.githubusercontent.com/arkadiyt/bounty-targets-data/refs/heads/main/data/domains.txt
⌛Filter main domains
cat domains.txt | awk -F '.' '{print $(NF-1)"."$NF}' | grep -Eo '([a-zA-Z0-9-]+\.)+[a-zA-Z]{2,}' | sort -u > main_domains
⏳Filter IP addresses
grep -Eo '\b([0-9]{1,3}\.){3}[0-9]{1,3}\b' domains.txt > ips.txt
That’s it, now perform mass recon and hunting 🤡
- Fuzz for only one particular path or endpoint that is not well known in public wordlists but you came to know it.
- Private nuclei templates.
- Pick only one bug and find on all programs based on whatever your methodology is for it. Forexample, only RXSS or scanning only one port number on all programs that you are well aware of is easily or mostly misconfigured by sysadmins and you can easily show the exploitation of it as well for POC purposes to get triaged quickly.
Commits History of asset updates🗳️